An ________ can be bypassed by holding down the Shift key when opening the database
A) AutoKey
B) AutoExec macro
C) Action
D) Action Group
B
Computer Science & Information Technology
You might also like to view...
Which of the following is NOT true regarding security alerts?
A) They display on the Message Bar below the Ribbon. B) They warn users when potentially dangerous active content exists. C) They can be resolved permanently by most college users in Trust Center. D) They can be resolved by users on a one-time basis in most situations.
Computer Science & Information Technology
Which of the following happens when the input data size grows for a logarithmic algorithm of O(log n) performance?
a. Performance degradation slows b. Memory use increases c. The algorithm becomes slower d. The input data size is reduced
Computer Science & Information Technology